Quiz: Chapter 03 (Secrets Management with SOPS)
Questions
Why is
git revertnot enough after a plaintext secret is committed?What is the role of
sops-ageinflux-system?Which file defines how secrets are encrypted with age in this repo?
In the Chapter 03 lab flow, what is the correct sequence?
- A) commit plaintext -> push -> encrypt later
- B) encrypt -> commit -> Flux decrypt/apply
- C) create secret directly in cluster and never track in Git
Name two hard stop conditions before committing secret changes.
You pushed an encrypted secret file, but
backend-secretsdoes not appear in namespacedevelop. What is the first manifest-level check?What command helps verify that Flux decryption/apply for develop secrets is healthy?
If a secret value is exposed in Git history, list two immediate response actions.
Why is storing
age.agekeyin Git considered a critical violation?Which is the preferred statement for this course?
- A) AI can auto-fix secret incidents in production
- B) AI suggests, humans approve, guardrails enforce safe execution
- C) If deployment is blocked, bypass encryption temporarily
Answer Key (Short)
- Because the value is already exposed in history/clones/logs; revert does not un-leak it.
- Holds the age private key used by Flux to decrypt SOPS-encrypted manifests.
.sops.yaml- B
- Example: plaintext values in secret manifest; committed private key material; wrong namespace/target.
- Check
flux/secrets/develop/kustomization.yamlincludesbackend-secrets.yaml. kubectl -n flux-system get kustomization secrets-develop(and/ordescribe).- Rotate affected credentials; start containment/audit of exposure scope.
- It gives decryption capability for encrypted secrets and collapses the whole trust model.
- B